Primitive Root - Cryptography | Number Theory

Поділитися
Вставка
  • Опубліковано 28 вер 2024
  • How to find Primitive root of a given number in mod(n)
    Using tables of indices to solve congruences.
    Lecture 2 - To find primitive root of a number ' n' : • Primitive Root | Lectu...
    Lecture - To find number of primitive roots of a prime number 'p' : • To find number of Prim...
    ===========================
    #PrimitiveRoot #NumberTheory
    Thanks for watching.
    Do like , share and subscribe
    --------------------------------------------------------------------
    #Cryptography #NetworkSecurity #Ciphers #SymmetricCiphers #Encryption
    #Decryption
    #ComputerScience #VTU #GATE
    #SecretKeyDistribution #PublicKeyCryptography
    Extended Euclidean Algorithm for Modular Inverse : • Extended Euclidean Alg...
    s DES - Key Generation: • S-DES Encryption || Si...
    s DES - Encryption : • S-DES Encryption || Si... Public
    Differences between s-DES and DES: • Differences between s-...
    Primitive Root : • Primitive Root - Crypt...
    Diffie Hellman Key Exchange : • Network Security - Dif...
    Euler's Totient Function [Euler's Phi Function] : • Euler's Totient Functi...
    Fermat's Theorem - Explanation with example: • Fermat's Theorem - Exp...
    Route Cipher: • Route Cipher - Transpo...
    Four Square Cipher: • Four Square Cipher - S...
    caesar Cipher: • Cryptography - Caesar...
    Meet in the middle attack : • Meet in the Middle att...
    Blowfish Algorithm : • BLOWFISH ALGORITHM in ...
    Elliptic Curve Cryptography - 1 : • Elliptic Curve Cryptog...
    Brute Force Attack : • Brute force attack in ...
    Avalanche Effect : • Avalanche Effect in Cr...
    Double DES and Triple DES : • Double DES and Triple...
    Steganography & Cryptography : • Steganography and Cryp...
    Block Cipher Modes of Operation : • Block Cipher Modes of ...
    Message Authentication using Hash Function: • Message Authentication...
    Message Authentication Codes MACs : • Network Security - Mes...
    Network Security - Attacks : • Network Security - Att...
    Authentication using Message Encryption : • Network Security - Au...
    RSA Algorithm : • Network Security - RSA...
    Advanced Encryption Standard : • Network Security - AES...
    Categories of Cryptographic Systems : • Categories of Cryptogr...
    Data Encryption Standard DES : • Data Encryption Standa...
    Public Key Cryptosystems : Advantages: • Public Key Cryptosyste...
    Public Key Distribution - Part 1 : • Public Key Distributio...
    Public Key Distribution - Part 2 : • Public Key Distributio...
    Vigenere Cipher: • Vigenere Cipher - Cryp...
    Affine Cipher : • Affine Cipher Encrypti...
    Chinese Remainder Theorem : • Video
    Congruences: • Congruences - Cryptogr...
    Transposition Cipher : • Transposition Cipher |...
    Euclidean Algorithm for GCD : • Euclidean Algorithm to...
    Playfair Cipher : • Cryptography - Playfai...
    =====================================================================
    To watch lecture videos on Cryptography:
    • Cryptography and Netwo...
    To watch lecture videos on Digital Electronics:
    • Digital Electronics / ...
    To watch lecture videos on 12th Maths:
    • CBSE - Class 12 - Math...
    To watch lecture videos on 10th Maths:
    • NCERT - 10th Mathematics
    To watch lecture videos on Vedic Maths:
    • Vedic Maths
    To watch lecture videos on Information Theory/Coding Theory:
    • Information Theory and...
    To watch lecture videos on Electronics:
    • Electronics
    To Subscribe:
    / @lecturesbyshreedarsha...
    To follow my Facebook page : / lectures-by-shreedarsh...
    Follow Naadopaasana channel - Classical Music, Spiritual discourse channel
    / @naadopaasana-musicisd...
    Follow my Blog on Hinduism and Spiritual Significance: naadopaasana.c...
    ---------------------------------------------------------------------------------------
    Engineering mathematics, Cryptography, Number Theory, Maths, Maths for Cryptography and network security, Network security,Engineering lectures,
    Lectures by Shreedarshan K,symmetric ciphers, Public key cryptosystems,Encryption, Decryption,Public Key Distribution,Public Key Authority,
    Public Key Certificate, Fermat's Theorem, Diffie Hellman Key Exchange, Hill Cipher ,VTU solved Examples,RSA,
    Ciphers
    Symmetric Ciphers
    Cryptography
    Network Security
    Polynomials
    Primitive root
    DES
    Data Encryption Standard
    Confusion
    Diffusion
    Hill Cipher
    Playfair Cipher
    Caesar Cipher
    Hill Cipher
    Steganography
    Triple DES
    Meet in the middle attack
    Blowfish Algorithm
    Eulers Theorem
    Chinese Remainder Theorem
    IDEA
    GCD
    Number Theory
    Extended Euclidean Algorithm for Modular Inverse

КОМЕНТАРІ • 46

  • @lecturesbyshreedarshank8977
    @lecturesbyshreedarshank8977  3 роки тому

    I have published " Bharatiya Katha Vaibhava Vol 1 and Vol 2" books for children. For details, orders check the telegram link:
    t.me/joinchat/bv4e2-mQrCtkZjI9

  • @EMPYTmain
    @EMPYTmain 3 роки тому +2

    Thanks sir. In whole You tube, there in no any video about primitive root with this much clear explanation. You saved me. Thanks again.

  • @Zatarra69
    @Zatarra69 3 роки тому +5

    this made so much more sense than the last video I watched on this, great job and thank you!!

  • @sreelekhap938
    @sreelekhap938 4 роки тому +2

    Thank you
    That's a great help!!

  • @0fficialRatedR
    @0fficialRatedR 2 роки тому

    good video

  • @muthumarin3048
    @muthumarin3048 3 роки тому

    Thank you sir very useful

  • @lecturesbyshreedarshank8977
    @lecturesbyshreedarshank8977  3 роки тому +3

    I am delighted to inform you all that i have authored a book of stories for children titled: " Bharatiya Katha Vaibhava -1".
    The book was released for Deepavali.
    This book features 25 unique and popular short Stories with beautiful illustrations from our Epics, and from the life of our Saints, Sages, and Rulers...
    This is indeed a wonderful gift for children especially to be given as a prize for competitions! You can order in bulk too. Orders are welcome for libraries, schools etc..
    Please note that Ebook kindle versions and paperback versions [B&W illustrations] can be bought online..
    Find the links..
    Zorba Store:- www.zorbabooks.com/store/children/bharatiya-katha-vaibhava-1-stories-for-children/
    Amazon (outside India) : www.amazon.com/Bharatiya-Katha-Vaibhava-SHREEDARSHAN-K-ebook/dp/B08N53PM3B/
    Amazon Kindle:- www.amazon.in/dp/B08N53PM3B
    Note: To buy the full colour version book (paperback with colour illustrations) please contact the author , as they are only being printed at the author's request. The discounted price of the full colour version book is Rs 300/-.
    Those who wish to avail of this offer, please contact/message me.(Especially if you want a full colour version book, please inform at the earliest..)
    For bulk orders and discounts on B&W version and for colour version books you can contact ...
    Email: shreedarshan@gmail.com
    / naadopaasana18@gmail.com
    Regards,
    Shreedarshan K (Author)

  • @stevemurimi1815
    @stevemurimi1815 3 роки тому

    Good job!

  • @sukumar9495
    @sukumar9495 4 роки тому +1

    tnq....sir

  • @janidcp6027
    @janidcp6027 4 роки тому

    Why we take less than 7 values only?

    • @Zatarra69
      @Zatarra69 3 роки тому

      Since 8 is just 7 + 1, it would give you all the same values as 1 since the seven gets divided out. 9 would be the same as 2, 10 would be the same as 3, and 15 would be the same as 1 again.

  • @Jorsherr
    @Jorsherr 2 роки тому +1

    Helped with primitive roots. Thanks

  • @nimeshranatunge734
    @nimeshranatunge734 3 роки тому +2

    Thanks sir

  • @debjoydhole2767
    @debjoydhole2767 4 роки тому +1

    you should also explain with a composite number

  • @wasit-shafi
    @wasit-shafi 4 роки тому +2

    Thank you soo much sir... keep it up

  • @lindsayryder6919
    @lindsayryder6919 3 роки тому +1

    Thank you for this clear explanation. I really appreciate that you took the time to make this :)

  • @malikboy2222
    @malikboy2222 2 роки тому

    Lots of love from kashmir....

  • @Abdulaziz-fg3mh
    @Abdulaziz-fg3mh 5 років тому +1

    very great job. I thank you so much, man. do not stop keep it up please

  • @olivieros.1324
    @olivieros.1324 5 років тому +2

    Managed to finish my exercise thanks to you, thanks !! awesome technique

  • @sachinshettyvs2848
    @sachinshettyvs2848 Рік тому

    Thank you Sir

  • @gk4864
    @gk4864 9 місяців тому

    The best 👏🏼

  • @carriballa
    @carriballa 3 роки тому +1

    Great explanation, thanks.

  • @richardgarzon977
    @richardgarzon977 5 років тому +2

    Great explanation. Thanks!!!!

  • @simontang4680
    @simontang4680 3 роки тому +1

    You're hand writing is lovely and so is your explanation

  • @TheGenius7685
    @TheGenius7685 5 років тому +1

    Thanks a lot sir, please make more videos for cyber security

  • @vishalnirney3194
    @vishalnirney3194 5 років тому +2

    Thanks a lot 🙏🙏

  • @ashokdewan3512
    @ashokdewan3512 4 роки тому +1

    Thanks it helped a lot.

  • @RickyCruz1301
    @RickyCruz1301 4 роки тому +2

    great tutorial!

  • @chinmaysoni4416
    @chinmaysoni4416 4 роки тому

    how can 10 and 5 be co-prime to each other gcd(10,5)=5 not 1

  • @niteshhebbare697
    @niteshhebbare697 5 років тому +1

    Awesome explanation 👍

  • @farahtasnim23
    @farahtasnim23 4 роки тому

    sir please tell about 31 primitive root

  • @zanti4132
    @zanti4132 11 місяців тому

    Just a few observations:
    Given an odd prime number n, then by Fermat's Little Theorem, aⁿ⁻¹ = 1 mod n for any positive integer a. Therefore, the n-1 entry in your table must be 1 regardless of the value for a. Since every integer from 1 to n-1 must be represented for a to be a primitive root, it follows that 1 can't appear in any other column.
    Again because every integer from 1 to n-1 must be represented, it follows that the entry with the n-1 value must be at the halfway point, i.e. the (n-1)/2 entry, for a to be a primitive root. We see this in your example: You show 3 and 5 to be the primitive roots of 7, and 6 is the value for n = 3 when a = 3 or 5. As for why this is true, it is because (n-1)² = n² - 2n +1 = 1 mod n. Since 1 must be the n-1 entry, the n-1 value must be the (n-1)/2 entry.
    So to find the primitive roots when n is prime, test the values for a from 1 to (n-1)/2 in ascending order. If you get a value that gives 1 mod n, you can stop - a is not a primitive root. If you get a value that gives (n-1) mod n, then a is a primitive root if and only if a = (n-1)/2.